July 7, 2016 | Disneyland Hotel, Anaheim CA
Join Fuel at Spark User Summit Southern California where you’ll:
- Meet fellow Palo Alto Networks users in the Anaheim Metro area
- Exclusively hear the latest updates and threat research from Palo Alto Networks
- Learn new skills in hands-on workshops and collaborative sessions
- Take home actionable solutions and strategies for key security issues
Breakfast, lunch and all education sessions are provided free of charge.
Get out of the office to invest in growing your network and security skills.
Spark User Summit Southern California:
1150 Magic Way
Anaheim, CA 92802
View maps and directions.
Looking to stay the night? Click here to reserve a room at our discounted rate. The reservation cut off date is June 16th.
Interested in visiting the Disney Parks? Discounted special group theme park tickets are available to purchase online.
Schedule at a Glance
Click on the session title to view details.
8:30 a.m. - 9:00 a.m.
9:00 a.m. - 9:05 a.m.
Welcome and Overview
Moshe Itah, Palo Alto Networks
Get a comprehensive overview of all the bells and whistles that make Palo Alto Networks’ Panorama an exceptional network security management product. Learn about our latest management features: template stacks, device group hierarchies, logging and reporting functionality and our flexible deployment options. Explore with us how to utilize the automated correlation engine and navigate all of the advanced features of the Application Command Center (ACC), including customization, workflows, and other advanced features.
10:05 a.m - 10:15 a.m.
10:15 a.m. - 10:20 a.m.
How to Leverage Fuel Community to Be an Expert
10:20 a.m. - 11:10 a.m.
Shared Experiences: Networking Activity >>
All attendees are encouraged to participate in our small group dialogue sessions, which will focus on topics selected by our attendees. In a small group setting, users will share ideas and best practices on topics including: Breaking Threats, Cloud, Endpoint & Network Security, Emerging Mobile Considerations and Analytics.This is a great way to connect with other local users.
11:10 a.m - 11:20 a.m.
11:20 a.m. - 12:20 p.m.
Migration to Palo Alto Networks Firewall Hands-on Lab - VPN, AppID & UserID
Mike Wickizer, Palo Alto Networks
Bring your laptop and plug in for an in-depth look at best practices for migrating your current policies to utilize your next-generation firewall to the fullest. The Palo Alto Networks Migration tool 3.0 is a new release that helps automate and accelerate the migration from third-party firewall vendors to Palo Alto Networks next-generation firewalls, as well as the migration from port-based security policies to an application-based approach with App-ID. This hands-on session will train you to utilize the many capabilities of this new tool as we demonstrate a migration from a Cisco ASA environment to a Palo Alto Networks next-generation firewall. We'll demonstrate how you can get the most value from your next-generation firewall while reducing your attack surface, and regaining visibility and control over your organization through the use of App-ID.
Prerequisites: Familiarity with firewalls and their configuration in general. Bring VMPlayer 6 or higher, workstation, or Fusion. Palo Alto Networks will provide a copy of the migration tool and a Cisco sample configuration to migrate during the session.
Critical Infrastructure Security – Addressing IT-OT Integration and Regulatory Compliance in the Utilities Sector
Phil Carey, Southern California Edison, George Williams, Palo Alto Networks
Cybersecurity is an increasingly important factor in ensuring resiliency, reliability, and safety of the electricity system. In this session, learn what Southern California Edison is doing to secure critical electric infrastructure by incorporating innovative security technologies into our grid, developing a next-generation Smart Grid architecture, and actively engaging with government agencies to share information on threats and protection measures.
12:20 p.m - 1:10 p.m.
Lunch with Partners
1:10 p.m. - 2:10 p.m.
Breakout Sessions >>
Enable Mobile Security Through Global Protect
Jon Anderson, Palo Alto Networks
Built upon the technologes of the Palo Alto Networks enterprise security platform, GlobalProtect provides a comprehensive security solution that is tailored to address the requirement for mobile devices. GlobalProtect is embedded in all Palo Alto Networks firewalls and can be enabled without additional license or subscription. Join this session to learn how to take full advantage of this hidden gem in your Palo Alto Network firewalls.
Palo Alto Everywhere - Extending the Perimeter in a Digital Workplace
Jon Garside, Aruba, an HPE Company
While we would like to have a firewall everywhere, management and cost make it prohibitive. This session discusses the methods of substituting policy for infrastructure without compromising security posture.
2:10 p.m - 2:20 p.m.
2:20 p.m. - 3:20 p.m.
Breakout Sessions >>
Become a Threat Intelligence Expert - Correlation, Analytics and Remediation Hands-on Lab
Peter McNaull, LogRhythm
During this hands-on workshop, you will have the opportunity to design security policies in a live environment, learn techniques to gain better visibility to potential cyber activity and detect, block and respond to cyber threats. This will include “how to” instruction on:
• Investigating compromised user accounts
• Researching security events and advanced persistent threats in a SIEM (security information and event management) environment
• Automating immediate response to cyber incidents to reduce the risk of experiencing a material breach
Automating System-Wide Security Response through Orchestration
Jennifer Geisler, ForeScout Technologies
Multivendor integration can improve operational efficiencies, accelerate threat response, boost security ROI and greatly improve a company’s network security and compliance posture. In this presentation, Ms. Geisler breaks down the anatomy of security orchestration. In addition, you’ll learn how ForeScout is extending the visibility and control capabilities of ForeScout CounterACT® to its partners’ security management products, as well as:
• The role ForeScout ControlFabric® Architecture and ForeScout Extended Module for Palo Alto Networks’ play in achieving rapid security orchestration
• Real-world security orchestration use cases Specific examples of how ForeScout helps leading Palo Alto Network share information and automate security workflows and response.
3:20 p.m - 3:30 p.m.
3:30 p.m. - 4:30 p.m.
Breakout Sessions >>
VMware NSX Introduction
Dwayne Sinclair, Sr. Manager, & Mason Ferratt, Sr. Systems Engineer, VMware
The lack of speed and flexibility in provisioning network and network services can be addressed through network virtualization, which decouples the network and network services from the physical hardware and then allows you to reproduce similar physical network topologies in logical space. As part of the lab modules, we will demonstrate how VMware NSX platform helps speed up provisioning of the required network and network services for the three-tier application. You will learn how you can micro-segment your data center traffic with the NSX distributed firewall and transparently insert the next gen Palo Alto Networks firewall for advanced security controls.
Wildfire IOC Hunting
Henry Obialisi, Director, Technical Account Management, Tanium
Learn first-hand how VMware has integrated Tanium IOC Detect and Palo Alto Networks WildFire together to enable the rapid identification and isolation of compromised endpoints, reduce false positives by sharing information across systems, and eliminate wasted time hunting for issues that were probably never there to begin with.
4:30 p.m - 5:30 p.m.
Happy Hour Reception provided by VMware
*subject to change.
Thank You to Our Sponsors